SlideShare una empresa de Scribd logo
1 de 49
Descargar para leer sin conexión
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Architecting for Healthcare
Compliance
Phil Christensen
Sr. Solutions Architect
www.logicworks.com
H L C 3 0 1 - i
Patrick Combes
WW Tech Lead – HCLS
AWS
Mithun Mallick
Sr. Solutions Architect
AWS
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Agenda
• HIPAA on AWS
• Common examples
• Logicworks:
• A typical HIPAA website stack
• Common challenges in legacy systems
• Our static ALB solution
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS enables HIPAA compliance
AWS enables customers to build HIPAA-compliant applications that store, process, or
transmit Protected Health Information (PHI)
 Business Associate Agreement (BAA) addendum available
 HIPAA-eligible services from AWS for a broad range of applications
Compute Storage Database Managed Big
Data
Archiving Data
Warehousing
Networking
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Growing set of HIPAA eligible services
0
7
10
19
23
29
31
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
What the BAA requires
The essential requirements
Be able to audit and trace all activity related to PHI/PII
Encryption of PHI/PII data while at rest
Encryption of PHI/PII while in transit
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
The shared responsibility model
Security of the cloud
Expert guidelines and resources to
assist customers with compliant
application development
AWS delivers
Security in the cloud
Develop, validate, and secure
applications based on due diligence
and expert consultation
Customer responsibility
HIPAA and FedRAMP compliance requirements
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Alignment to HIPAA security rule
HIPAA security
rule
(45 CFR Part 160 and Subparts A
and C of Part 164)
NIST 800-66
An introductory resource guide
for implementing the Health
Insurance Portability and
Accountability Act (HIPAA)
Security Rule
NIST 800-53
Moderate baseline + FedRAMP
controls
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
HIPAA security rule—Fine print explained
The security rule is located at 45 CFR Part 160 and subparts
A and C of Part 164
Title 45 of the Code of Federal Regulations—Public Welfare
Subtitle A - Health and Human Services
Subchapter C - ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS
Part 160 - General Administrative Requirements
Part 164 - Security and Privacy
Subpart C - Security Standards for the Protection of Electronic Protected Health Information
Section 164.308 - Administrative Safeguards
Section 164.310 - Physical Safeguards
Section 164.312 - Technical Safeguards
164.312(b)(2) – Standard: Audit Controls
Section 164.314 - Organizational Safeguards
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Audit controls 164.312(b)(2)
164.312 (b)(2) Standard: Audit controls
Implement hardware, software, and/or procedural mechanisms that *record and examine
activity* in information systems that contain or use electronic protected health
information.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Audit controls 164.308(b)(2)—OCR audit protocol
§164.312(b):
Key activity
Determine the activities that will be tracked or audited
Audit procedures
Inquire of management as to whether audit controls have been implemented over information systems that contain or use
ePHI. Obtain and review documentation relative to the specified criteria to determine whether audit controls have been
implemented over information systems that contain or use ePHI.
Key activity
Select the tools that will be deployed for auditing and system activity reviews.
Audit procedures
Inquire of management as to whether systems and applications have been evaluated to determine whether upgrades are
necessary to implement audit capabilities. Obtain and review documentation of tools or applications that management has
identified to capture the appropriate audit information.
Something you have to do.
Something you have to do.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS CloudTrail
Enable governance, compliance, and operational/risk auditing of your
AWS account.
AWS Config
Record and evaluate configurations of your AWS resources. Enable
compliance auditing, security analysis, resource change tracking, and
troubleshooting.
Amazon CloudWatch
Monitor AWS Cloud resources and your applications on AWS to
collect metrics, monitor log files, set alarms, and automatically
react to changes.
Amazon GuardDuty
Intelligent threat detection and continuous monitoring to protect
your AWS accounts and workloads.
VPC Flow Logs
Capture information about the IP traffic going to and from network
interfaces in your VPC. Flow log data is stored using Amazon
CloudWatch Logs.
Gain the visibility you need
to spot issues before they
impact the business, improve
your security posture, and
reduce the risk profile of
your environment
Detective
control
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Audit controls 164.312(b)(2)—OCR Audit protocol—
Select the tools
CloudTrail CloudWatch Logs Amazon
Kinesis
CloudWatch
Logs
subscription
consumer
(KCL-based)
CloudWatch
Logs
subscription
Amazon EC2
+
CloudWatch
Logs agent
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
HIPAA security rule—Fine print explained
…or“HowdoIderiveengineeringfromregulation?”
The security rule is located at 45 CFR Part 160 and subparts
A and C of Part 164.
Title 45 of the Code of Federal Regulations—Public Welfare
Subtitle A - Health and Human Services
Subchapter C - ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS
Part 160 - General Administrative Requirements
Part 164 - Security and Privacy
Subpart C - Security Standards for the Protection of Electronic Protected Health Information
Section 164.312 - Technical Safeguards
164.312(a)(1) – Standard: Access Control
164.312(a)(2) - Implementation Specification
(iv) Encryption and decryption (Addressable). Implement a mechanism to encrypt and decrypt electronic protected health information.
164.312(e)(1) – Standard: Transmission Security
164.312(e)2) – Implementation Specification
(ii) Encryption (Addressable). Implement a mechanism to encrypt electronic protected health information whenever deemed appropriate.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Encryption controls—164.312(a)(2)(iv)
164.312 (a)(2)(iv) Standard: Access control
Encryption and decryption (addressable). Implement a mechanism to encrypt and decrypt electronic
protected health information.
Guidance to render unsecured protected health information unusable, unreadable, or indecipherable to
unauthorized individuals.
http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/brguidance.html
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Encryption controls—164.312(a)(2)(iv)
Guidance to render unsecured protected health information unusable, unreadable, or indecipherable
to unauthorized individuals
http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/brguidance.html
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Encryption controls—164.312(a)(2)(iv)
Electronic PHI has been encrypted as specified in the HIPAA Security Rule by “the use of an
algorithmic process to transform data into a form in which there is a low probability of assigning
meaning without use of a confidential process or key” (45 CFR 164.304 definition of encryption)
and such confidential process or key that might enable decryption has not been breached. To
avoid a breach of the confidential process or key, these decryption tools should be stored on a
device or at a location separate from the data they are used to encrypt or decrypt.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Encryption Controls—164.312(a)(2)(iv)—OCR Audit
protocol
§164.312(a)(2)(iv):
Key activity
Encryption and decryption
Audit procedures
Inquire of management as to whether an encryption mechanism is in place to protect ePHI. Obtain and review formal or
informal policies and procedures and evaluate the content relative to the specified criteria to determine that encryption
standards exist to protect ePHI. Based on the complexity of the entity, elements to consider include but are not limited to:
- Type(s) of encryption used.
- How encryption keys are protected.
- Access to modify or create keys is restricted to appropriate personnel.
- How keys are managed.
Something you have to do.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Example architectures
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Management VPCUsers
Three-tier web application architecture
Archive
Logs
Bucket
S3
Lifecycle
Policies to
Glacier
CloudTrailAWS Config
Rules
CloudWatch
Alarms
NAT
us-west-2a
Bastion
us-west-2b
Potential use
for security
appliances
for
monitoring,
logging, etc.
us-west-2a
us-west-2b
Proxies
NAT
RDS
DB
DMZSubnet
PrivateSubnet
PrivateSubnet
RDS
DB
PrivateSubnet
PrivateSubnet
Production VPC
DMZSubnet
Proxies
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Conversational bots
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
InternetBrowser
AWS Lambda
functions
Pre-existing
Endpoints on AWS
Any publicly
accessible
endpoint
Amazon CloudFront,
along with Lambda @
Edge
- Perform rewriting of
URL or cleanup of data
parameters.
Amazon API
Gateway
Amazon
DynamoDB
Amazon S3 – static
files. Connect to API
gateway end point
for dynamic content.
Corporate data center
Traditional server
Serverless web application
AWS WAF
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Mobile Device
AWS Lambda
functions to ingest
data
Mobile diagnostics
Medical
Sensor
iOS
Android
Store on Amazon
DynamoDB
Amazon SNS
RESTful API’s using
Amazon API
Gateway
Amazon API
Gateway
Web app using
AWS Lambda
functions
Caregiver
Browser
User pool and
device sync using
Amazon Cognito.
Static edge content using
Amazon CloudFront.
Data cleanup using
Lambda@Edge
Send notifications
Common network issues
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Required HIPAA configurations
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Top HIPAA architecture issues
90%
Encryption in
transit (SSL)
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Why network issues?
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Agenda
• A typical HIPAA website stack
• Network challenges in legacy systems
• Our static ALB solution
Common network issues and how to resolve them
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Typical HIPAA website stack
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Typical HIPAA website stack
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Typical HIPAA website stack
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Typical HIPAA website stack
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Typical HIPAA website stack
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Typical HIPAA website stack
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Expectations Reality
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Legacy networking issues
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Anti-patterns
Network Load
Balancers
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Anti-patterns
That’s the domain name for the IP 1.2.3.4.5.6.
The TTL value says “300 seconds”
Client DNS Server
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Anti-patterns
No Load
Balancing
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
A better solution
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Better solution for multi-cert situations
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Prerequisites
Internal Application Load Balancer
IP IP IP
How do we keep up-to-date?
How do we keep up-to-date?
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
A perfect task for Lambda
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Get the solution now!
http://logicworks-oss.s3-website-us-east-1.amazonaws.com/static-alb.yaml
Thank you!
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.

Más contenido relacionado

La actualidad más candente

Data.Monks sGTM is a universal endpoint.pptx
Data.Monks sGTM is a universal endpoint.pptxData.Monks sGTM is a universal endpoint.pptx
Data.Monks sGTM is a universal endpoint.pptxDoug Hall
 
An introduction to Serverless
An introduction to ServerlessAn introduction to Serverless
An introduction to ServerlessAdrien Blind
 
Backup and archiving in the aws cloud
Backup and archiving in the aws cloudBackup and archiving in the aws cloud
Backup and archiving in the aws cloudAmazon Web Services
 
Hands-on SaaS: Constructing a Multi-Tenant Solution on AWS (ARC327-R1) - AWS ...
Hands-on SaaS: Constructing a Multi-Tenant Solution on AWS (ARC327-R1) - AWS ...Hands-on SaaS: Constructing a Multi-Tenant Solution on AWS (ARC327-R1) - AWS ...
Hands-on SaaS: Constructing a Multi-Tenant Solution on AWS (ARC327-R1) - AWS ...Amazon Web Services
 
Digital Transformation: Leveraging AWS as a Launchpad (CMP205-S) - AWS re:Inv...
Digital Transformation: Leveraging AWS as a Launchpad (CMP205-S) - AWS re:Inv...Digital Transformation: Leveraging AWS as a Launchpad (CMP205-S) - AWS re:Inv...
Digital Transformation: Leveraging AWS as a Launchpad (CMP205-S) - AWS re:Inv...Amazon Web Services
 
[Study Guide] Google Professional Cloud Architect (GCP-PCA) Certification
[Study Guide] Google Professional Cloud Architect (GCP-PCA) Certification[Study Guide] Google Professional Cloud Architect (GCP-PCA) Certification
[Study Guide] Google Professional Cloud Architect (GCP-PCA) CertificationAmaaira Johns
 
A Microservices Framework for Real-Time Model Scoring Using Structured Stream...
A Microservices Framework for Real-Time Model Scoring Using Structured Stream...A Microservices Framework for Real-Time Model Scoring Using Structured Stream...
A Microservices Framework for Real-Time Model Scoring Using Structured Stream...Databricks
 
Continuous Integration for Dynamics 365/CRM
Continuous Integration for Dynamics 365/CRMContinuous Integration for Dynamics 365/CRM
Continuous Integration for Dynamics 365/CRMWael Hamze
 
AWS RDS Presentation - DOAG Conference
AWS RDS Presentation - DOAG Conference AWS RDS Presentation - DOAG Conference
AWS RDS Presentation - DOAG Conference Amazon Web Services
 
Monetizing the AWS Cloud Leveraging APN Programs, Training, and Support-AWS-P...
Monetizing the AWS Cloud Leveraging APN Programs, Training, and Support-AWS-P...Monetizing the AWS Cloud Leveraging APN Programs, Training, and Support-AWS-P...
Monetizing the AWS Cloud Leveraging APN Programs, Training, and Support-AWS-P...Amazon Web Services
 
Build High-Throughput, Bursty Data Apps with Amazon SQS, SNS, & Lambda (API30...
Build High-Throughput, Bursty Data Apps with Amazon SQS, SNS, & Lambda (API30...Build High-Throughput, Bursty Data Apps with Amazon SQS, SNS, & Lambda (API30...
Build High-Throughput, Bursty Data Apps with Amazon SQS, SNS, & Lambda (API30...Amazon Web Services
 
Reliability of the Cloud: How AWS Achieves High Availability (ARC317-R1) - AW...
Reliability of the Cloud: How AWS Achieves High Availability (ARC317-R1) - AW...Reliability of the Cloud: How AWS Achieves High Availability (ARC317-R1) - AW...
Reliability of the Cloud: How AWS Achieves High Availability (ARC317-R1) - AW...Amazon Web Services
 
Observability for modern applications
Observability for modern applications  Observability for modern applications
Observability for modern applications MoovingON
 

La actualidad más candente (20)

Splunk-Presentation
Splunk-Presentation Splunk-Presentation
Splunk-Presentation
 
Data.Monks sGTM is a universal endpoint.pptx
Data.Monks sGTM is a universal endpoint.pptxData.Monks sGTM is a universal endpoint.pptx
Data.Monks sGTM is a universal endpoint.pptx
 
Open Banking APIs on AWS
Open Banking APIs on AWSOpen Banking APIs on AWS
Open Banking APIs on AWS
 
Machine Learning on AWS
Machine Learning on AWSMachine Learning on AWS
Machine Learning on AWS
 
Introduction to Chaos Engineering
Introduction to Chaos EngineeringIntroduction to Chaos Engineering
Introduction to Chaos Engineering
 
An introduction to Serverless
An introduction to ServerlessAn introduction to Serverless
An introduction to Serverless
 
Backup and archiving in the aws cloud
Backup and archiving in the aws cloudBackup and archiving in the aws cloud
Backup and archiving in the aws cloud
 
Hands-on SaaS: Constructing a Multi-Tenant Solution on AWS (ARC327-R1) - AWS ...
Hands-on SaaS: Constructing a Multi-Tenant Solution on AWS (ARC327-R1) - AWS ...Hands-on SaaS: Constructing a Multi-Tenant Solution on AWS (ARC327-R1) - AWS ...
Hands-on SaaS: Constructing a Multi-Tenant Solution on AWS (ARC327-R1) - AWS ...
 
Digital Transformation: Leveraging AWS as a Launchpad (CMP205-S) - AWS re:Inv...
Digital Transformation: Leveraging AWS as a Launchpad (CMP205-S) - AWS re:Inv...Digital Transformation: Leveraging AWS as a Launchpad (CMP205-S) - AWS re:Inv...
Digital Transformation: Leveraging AWS as a Launchpad (CMP205-S) - AWS re:Inv...
 
Observability
ObservabilityObservability
Observability
 
[Study Guide] Google Professional Cloud Architect (GCP-PCA) Certification
[Study Guide] Google Professional Cloud Architect (GCP-PCA) Certification[Study Guide] Google Professional Cloud Architect (GCP-PCA) Certification
[Study Guide] Google Professional Cloud Architect (GCP-PCA) Certification
 
A Microservices Framework for Real-Time Model Scoring Using Structured Stream...
A Microservices Framework for Real-Time Model Scoring Using Structured Stream...A Microservices Framework for Real-Time Model Scoring Using Structured Stream...
A Microservices Framework for Real-Time Model Scoring Using Structured Stream...
 
Continuous Integration for Dynamics 365/CRM
Continuous Integration for Dynamics 365/CRMContinuous Integration for Dynamics 365/CRM
Continuous Integration for Dynamics 365/CRM
 
AWS RDS Presentation - DOAG Conference
AWS RDS Presentation - DOAG Conference AWS RDS Presentation - DOAG Conference
AWS RDS Presentation - DOAG Conference
 
Function as a Service
Function as a ServiceFunction as a Service
Function as a Service
 
Monetizing the AWS Cloud Leveraging APN Programs, Training, and Support-AWS-P...
Monetizing the AWS Cloud Leveraging APN Programs, Training, and Support-AWS-P...Monetizing the AWS Cloud Leveraging APN Programs, Training, and Support-AWS-P...
Monetizing the AWS Cloud Leveraging APN Programs, Training, and Support-AWS-P...
 
Build High-Throughput, Bursty Data Apps with Amazon SQS, SNS, & Lambda (API30...
Build High-Throughput, Bursty Data Apps with Amazon SQS, SNS, & Lambda (API30...Build High-Throughput, Bursty Data Apps with Amazon SQS, SNS, & Lambda (API30...
Build High-Throughput, Bursty Data Apps with Amazon SQS, SNS, & Lambda (API30...
 
Reliability of the Cloud: How AWS Achieves High Availability (ARC317-R1) - AW...
Reliability of the Cloud: How AWS Achieves High Availability (ARC317-R1) - AW...Reliability of the Cloud: How AWS Achieves High Availability (ARC317-R1) - AW...
Reliability of the Cloud: How AWS Achieves High Availability (ARC317-R1) - AW...
 
Observability for modern applications
Observability for modern applications  Observability for modern applications
Observability for modern applications
 
AWS Security By Design
AWS Security By DesignAWS Security By Design
AWS Security By Design
 

Similar a Architecting for Healthcare Compliance on AWS (HLC301-i) - AWS re:Invent 2018

HIPAA Solutions on Cloud Foundry
HIPAA Solutions on Cloud FoundryHIPAA Solutions on Cloud Foundry
HIPAA Solutions on Cloud FoundryJim Shingler
 
Unlock Highly Regulated Enterprise Workloads with SaaS on AWS GovCloud (US) (...
Unlock Highly Regulated Enterprise Workloads with SaaS on AWS GovCloud (US) (...Unlock Highly Regulated Enterprise Workloads with SaaS on AWS GovCloud (US) (...
Unlock Highly Regulated Enterprise Workloads with SaaS on AWS GovCloud (US) (...Amazon Web Services
 
Build HIPAA Eligible Solutions with AWS and APN Partners PPT
 Build HIPAA Eligible Solutions with AWS and APN Partners PPT Build HIPAA Eligible Solutions with AWS and APN Partners PPT
Build HIPAA Eligible Solutions with AWS and APN Partners PPTAmazon Web Services
 
AWS re:Invent 2016: Chalk Talk: Applying Security-by-Design to Drive Complian...
AWS re:Invent 2016: Chalk Talk: Applying Security-by-Design to Drive Complian...AWS re:Invent 2016: Chalk Talk: Applying Security-by-Design to Drive Complian...
AWS re:Invent 2016: Chalk Talk: Applying Security-by-Design to Drive Complian...Amazon Web Services
 
DOES15 - Bill Shinn - Prove it! The Last Mile for DevOps in Regulated Organiz...
DOES15 - Bill Shinn - Prove it! The Last Mile for DevOps in Regulated Organiz...DOES15 - Bill Shinn - Prove it! The Last Mile for DevOps in Regulated Organiz...
DOES15 - Bill Shinn - Prove it! The Last Mile for DevOps in Regulated Organiz...Gene Kim
 
Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance Avi Networks
 
(SEC304) Architecting for HIPAA Compliance on AWS
(SEC304) Architecting for HIPAA Compliance on AWS(SEC304) Architecting for HIPAA Compliance on AWS
(SEC304) Architecting for HIPAA Compliance on AWSAmazon Web Services
 
Performing a Security Assessment of the Cloud using the Risk Management Frame...
Performing a Security Assessment of the Cloud using the Risk Management Frame...Performing a Security Assessment of the Cloud using the Risk Management Frame...
Performing a Security Assessment of the Cloud using the Risk Management Frame...Amazon Web Services
 
Continuous Compliance for Modern Application Pipelines (GPSWS402) - AWS re:In...
Continuous Compliance for Modern Application Pipelines (GPSWS402) - AWS re:In...Continuous Compliance for Modern Application Pipelines (GPSWS402) - AWS re:In...
Continuous Compliance for Modern Application Pipelines (GPSWS402) - AWS re:In...Amazon Web Services
 
Enabling Compliance with GDPR on AWS
Enabling Compliance with GDPR on AWSEnabling Compliance with GDPR on AWS
Enabling Compliance with GDPR on AWSAmazon Web Services
 
CIP IT Governance 5.0 Solution Guide for ArcSight Logger
CIP IT Governance 5.0 Solution Guide for ArcSight LoggerCIP IT Governance 5.0 Solution Guide for ArcSight Logger
CIP IT Governance 5.0 Solution Guide for ArcSight Loggerprotect724rkeer
 
AWS Security Week: Why Your Customers Care About Compliance
AWS Security Week: Why Your Customers Care About ComplianceAWS Security Week: Why Your Customers Care About Compliance
AWS Security Week: Why Your Customers Care About ComplianceAmazon Web Services
 
apidays London 2023 - API Programs - Security by Design, Privacy by Default, ...
apidays London 2023 - API Programs - Security by Design, Privacy by Default, ...apidays London 2023 - API Programs - Security by Design, Privacy by Default, ...
apidays London 2023 - API Programs - Security by Design, Privacy by Default, ...apidays
 
HIPAA Compliance for Developers
HIPAA Compliance for DevelopersHIPAA Compliance for Developers
HIPAA Compliance for DevelopersTrueVault
 
WPS301-Navigating HIPAA and HITRUST_QuickStart Guide to Account Gov Strat.pdf
WPS301-Navigating HIPAA and HITRUST_QuickStart Guide to Account Gov Strat.pdfWPS301-Navigating HIPAA and HITRUST_QuickStart Guide to Account Gov Strat.pdf
WPS301-Navigating HIPAA and HITRUST_QuickStart Guide to Account Gov Strat.pdfAmazon Web Services
 
HIPAA and HITRUST on AWS
HIPAA and HITRUST on AWSHIPAA and HITRUST on AWS
HIPAA and HITRUST on AWSLogicworksNY
 
Securing Healthcare Data on AWS for HIPAA
Securing Healthcare Data on AWS for HIPAASecuring Healthcare Data on AWS for HIPAA
Securing Healthcare Data on AWS for HIPAAAlert Logic
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelinesamburyj3c9
 

Similar a Architecting for Healthcare Compliance on AWS (HLC301-i) - AWS re:Invent 2018 (20)

HIPAA Solutions on Cloud Foundry
HIPAA Solutions on Cloud FoundryHIPAA Solutions on Cloud Foundry
HIPAA Solutions on Cloud Foundry
 
Unlock Highly Regulated Enterprise Workloads with SaaS on AWS GovCloud (US) (...
Unlock Highly Regulated Enterprise Workloads with SaaS on AWS GovCloud (US) (...Unlock Highly Regulated Enterprise Workloads with SaaS on AWS GovCloud (US) (...
Unlock Highly Regulated Enterprise Workloads with SaaS on AWS GovCloud (US) (...
 
Build HIPAA Eligible Solutions with AWS and APN Partners PPT
 Build HIPAA Eligible Solutions with AWS and APN Partners PPT Build HIPAA Eligible Solutions with AWS and APN Partners PPT
Build HIPAA Eligible Solutions with AWS and APN Partners PPT
 
AWS re:Invent 2016: Chalk Talk: Applying Security-by-Design to Drive Complian...
AWS re:Invent 2016: Chalk Talk: Applying Security-by-Design to Drive Complian...AWS re:Invent 2016: Chalk Talk: Applying Security-by-Design to Drive Complian...
AWS re:Invent 2016: Chalk Talk: Applying Security-by-Design to Drive Complian...
 
DOES15 - Bill Shinn - Prove it! The Last Mile for DevOps in Regulated Organiz...
DOES15 - Bill Shinn - Prove it! The Last Mile for DevOps in Regulated Organiz...DOES15 - Bill Shinn - Prove it! The Last Mile for DevOps in Regulated Organiz...
DOES15 - Bill Shinn - Prove it! The Last Mile for DevOps in Regulated Organiz...
 
Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance
 
(SEC304) Architecting for HIPAA Compliance on AWS
(SEC304) Architecting for HIPAA Compliance on AWS(SEC304) Architecting for HIPAA Compliance on AWS
(SEC304) Architecting for HIPAA Compliance on AWS
 
Performing a Security Assessment of the Cloud using the Risk Management Frame...
Performing a Security Assessment of the Cloud using the Risk Management Frame...Performing a Security Assessment of the Cloud using the Risk Management Frame...
Performing a Security Assessment of the Cloud using the Risk Management Frame...
 
GDPR x AWS 導覽 (Level 200)
GDPR x AWS 導覽 (Level 200)GDPR x AWS 導覽 (Level 200)
GDPR x AWS 導覽 (Level 200)
 
GDPR and Automation Overview
GDPR and Automation OverviewGDPR and Automation Overview
GDPR and Automation Overview
 
Continuous Compliance for Modern Application Pipelines (GPSWS402) - AWS re:In...
Continuous Compliance for Modern Application Pipelines (GPSWS402) - AWS re:In...Continuous Compliance for Modern Application Pipelines (GPSWS402) - AWS re:In...
Continuous Compliance for Modern Application Pipelines (GPSWS402) - AWS re:In...
 
Enabling Compliance with GDPR on AWS
Enabling Compliance with GDPR on AWSEnabling Compliance with GDPR on AWS
Enabling Compliance with GDPR on AWS
 
CIP IT Governance 5.0 Solution Guide for ArcSight Logger
CIP IT Governance 5.0 Solution Guide for ArcSight LoggerCIP IT Governance 5.0 Solution Guide for ArcSight Logger
CIP IT Governance 5.0 Solution Guide for ArcSight Logger
 
AWS Security Week: Why Your Customers Care About Compliance
AWS Security Week: Why Your Customers Care About ComplianceAWS Security Week: Why Your Customers Care About Compliance
AWS Security Week: Why Your Customers Care About Compliance
 
apidays London 2023 - API Programs - Security by Design, Privacy by Default, ...
apidays London 2023 - API Programs - Security by Design, Privacy by Default, ...apidays London 2023 - API Programs - Security by Design, Privacy by Default, ...
apidays London 2023 - API Programs - Security by Design, Privacy by Default, ...
 
HIPAA Compliance for Developers
HIPAA Compliance for DevelopersHIPAA Compliance for Developers
HIPAA Compliance for Developers
 
WPS301-Navigating HIPAA and HITRUST_QuickStart Guide to Account Gov Strat.pdf
WPS301-Navigating HIPAA and HITRUST_QuickStart Guide to Account Gov Strat.pdfWPS301-Navigating HIPAA and HITRUST_QuickStart Guide to Account Gov Strat.pdf
WPS301-Navigating HIPAA and HITRUST_QuickStart Guide to Account Gov Strat.pdf
 
HIPAA and HITRUST on AWS
HIPAA and HITRUST on AWSHIPAA and HITRUST on AWS
HIPAA and HITRUST on AWS
 
Securing Healthcare Data on AWS for HIPAA
Securing Healthcare Data on AWS for HIPAASecuring Healthcare Data on AWS for HIPAA
Securing Healthcare Data on AWS for HIPAA
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelines
 

Más de Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Come costruire un'architettura Serverless nel Cloud AWS
Come costruire un'architettura Serverless nel Cloud AWSCome costruire un'architettura Serverless nel Cloud AWS
Come costruire un'architettura Serverless nel Cloud AWSAmazon Web Services
 

Más de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Come costruire un'architettura Serverless nel Cloud AWS
Come costruire un'architettura Serverless nel Cloud AWSCome costruire un'architettura Serverless nel Cloud AWS
Come costruire un'architettura Serverless nel Cloud AWS
 

Architecting for Healthcare Compliance on AWS (HLC301-i) - AWS re:Invent 2018

  • 1.
  • 2. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Architecting for Healthcare Compliance Phil Christensen Sr. Solutions Architect www.logicworks.com H L C 3 0 1 - i Patrick Combes WW Tech Lead – HCLS AWS Mithun Mallick Sr. Solutions Architect AWS
  • 3. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Agenda • HIPAA on AWS • Common examples • Logicworks: • A typical HIPAA website stack • Common challenges in legacy systems • Our static ALB solution
  • 4. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS enables HIPAA compliance AWS enables customers to build HIPAA-compliant applications that store, process, or transmit Protected Health Information (PHI)  Business Associate Agreement (BAA) addendum available  HIPAA-eligible services from AWS for a broad range of applications Compute Storage Database Managed Big Data Archiving Data Warehousing Networking
  • 5. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Growing set of HIPAA eligible services 0 7 10 19 23 29 31
  • 6. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. What the BAA requires The essential requirements Be able to audit and trace all activity related to PHI/PII Encryption of PHI/PII data while at rest Encryption of PHI/PII while in transit
  • 7. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. The shared responsibility model Security of the cloud Expert guidelines and resources to assist customers with compliant application development AWS delivers Security in the cloud Develop, validate, and secure applications based on due diligence and expert consultation Customer responsibility HIPAA and FedRAMP compliance requirements
  • 8. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Alignment to HIPAA security rule HIPAA security rule (45 CFR Part 160 and Subparts A and C of Part 164) NIST 800-66 An introductory resource guide for implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule NIST 800-53 Moderate baseline + FedRAMP controls
  • 9. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. HIPAA security rule—Fine print explained The security rule is located at 45 CFR Part 160 and subparts A and C of Part 164 Title 45 of the Code of Federal Regulations—Public Welfare Subtitle A - Health and Human Services Subchapter C - ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS Part 160 - General Administrative Requirements Part 164 - Security and Privacy Subpart C - Security Standards for the Protection of Electronic Protected Health Information Section 164.308 - Administrative Safeguards Section 164.310 - Physical Safeguards Section 164.312 - Technical Safeguards 164.312(b)(2) – Standard: Audit Controls Section 164.314 - Organizational Safeguards
  • 10. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Audit controls 164.312(b)(2) 164.312 (b)(2) Standard: Audit controls Implement hardware, software, and/or procedural mechanisms that *record and examine activity* in information systems that contain or use electronic protected health information.
  • 11. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Audit controls 164.308(b)(2)—OCR audit protocol §164.312(b): Key activity Determine the activities that will be tracked or audited Audit procedures Inquire of management as to whether audit controls have been implemented over information systems that contain or use ePHI. Obtain and review documentation relative to the specified criteria to determine whether audit controls have been implemented over information systems that contain or use ePHI. Key activity Select the tools that will be deployed for auditing and system activity reviews. Audit procedures Inquire of management as to whether systems and applications have been evaluated to determine whether upgrades are necessary to implement audit capabilities. Obtain and review documentation of tools or applications that management has identified to capture the appropriate audit information. Something you have to do. Something you have to do.
  • 12. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS CloudTrail Enable governance, compliance, and operational/risk auditing of your AWS account. AWS Config Record and evaluate configurations of your AWS resources. Enable compliance auditing, security analysis, resource change tracking, and troubleshooting. Amazon CloudWatch Monitor AWS Cloud resources and your applications on AWS to collect metrics, monitor log files, set alarms, and automatically react to changes. Amazon GuardDuty Intelligent threat detection and continuous monitoring to protect your AWS accounts and workloads. VPC Flow Logs Capture information about the IP traffic going to and from network interfaces in your VPC. Flow log data is stored using Amazon CloudWatch Logs. Gain the visibility you need to spot issues before they impact the business, improve your security posture, and reduce the risk profile of your environment Detective control
  • 13. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Audit controls 164.312(b)(2)—OCR Audit protocol— Select the tools CloudTrail CloudWatch Logs Amazon Kinesis CloudWatch Logs subscription consumer (KCL-based) CloudWatch Logs subscription Amazon EC2 + CloudWatch Logs agent
  • 14. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. HIPAA security rule—Fine print explained …or“HowdoIderiveengineeringfromregulation?” The security rule is located at 45 CFR Part 160 and subparts A and C of Part 164. Title 45 of the Code of Federal Regulations—Public Welfare Subtitle A - Health and Human Services Subchapter C - ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS Part 160 - General Administrative Requirements Part 164 - Security and Privacy Subpart C - Security Standards for the Protection of Electronic Protected Health Information Section 164.312 - Technical Safeguards 164.312(a)(1) – Standard: Access Control 164.312(a)(2) - Implementation Specification (iv) Encryption and decryption (Addressable). Implement a mechanism to encrypt and decrypt electronic protected health information. 164.312(e)(1) – Standard: Transmission Security 164.312(e)2) – Implementation Specification (ii) Encryption (Addressable). Implement a mechanism to encrypt electronic protected health information whenever deemed appropriate.
  • 15. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Encryption controls—164.312(a)(2)(iv) 164.312 (a)(2)(iv) Standard: Access control Encryption and decryption (addressable). Implement a mechanism to encrypt and decrypt electronic protected health information. Guidance to render unsecured protected health information unusable, unreadable, or indecipherable to unauthorized individuals. http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/brguidance.html
  • 16. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Encryption controls—164.312(a)(2)(iv) Guidance to render unsecured protected health information unusable, unreadable, or indecipherable to unauthorized individuals http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/brguidance.html
  • 17. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Encryption controls—164.312(a)(2)(iv) Electronic PHI has been encrypted as specified in the HIPAA Security Rule by “the use of an algorithmic process to transform data into a form in which there is a low probability of assigning meaning without use of a confidential process or key” (45 CFR 164.304 definition of encryption) and such confidential process or key that might enable decryption has not been breached. To avoid a breach of the confidential process or key, these decryption tools should be stored on a device or at a location separate from the data they are used to encrypt or decrypt.
  • 18. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Encryption Controls—164.312(a)(2)(iv)—OCR Audit protocol §164.312(a)(2)(iv): Key activity Encryption and decryption Audit procedures Inquire of management as to whether an encryption mechanism is in place to protect ePHI. Obtain and review formal or informal policies and procedures and evaluate the content relative to the specified criteria to determine that encryption standards exist to protect ePHI. Based on the complexity of the entity, elements to consider include but are not limited to: - Type(s) of encryption used. - How encryption keys are protected. - Access to modify or create keys is restricted to appropriate personnel. - How keys are managed. Something you have to do.
  • 19. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Example architectures
  • 20. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Management VPCUsers Three-tier web application architecture Archive Logs Bucket S3 Lifecycle Policies to Glacier CloudTrailAWS Config Rules CloudWatch Alarms NAT us-west-2a Bastion us-west-2b Potential use for security appliances for monitoring, logging, etc. us-west-2a us-west-2b Proxies NAT RDS DB DMZSubnet PrivateSubnet PrivateSubnet RDS DB PrivateSubnet PrivateSubnet Production VPC DMZSubnet Proxies
  • 21. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Conversational bots
  • 22. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. InternetBrowser AWS Lambda functions Pre-existing Endpoints on AWS Any publicly accessible endpoint Amazon CloudFront, along with Lambda @ Edge - Perform rewriting of URL or cleanup of data parameters. Amazon API Gateway Amazon DynamoDB Amazon S3 – static files. Connect to API gateway end point for dynamic content. Corporate data center Traditional server Serverless web application AWS WAF
  • 23. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Mobile Device AWS Lambda functions to ingest data Mobile diagnostics Medical Sensor iOS Android Store on Amazon DynamoDB Amazon SNS RESTful API’s using Amazon API Gateway Amazon API Gateway Web app using AWS Lambda functions Caregiver Browser User pool and device sync using Amazon Cognito. Static edge content using Amazon CloudFront. Data cleanup using Lambda@Edge Send notifications
  • 25. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Required HIPAA configurations
  • 26. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Top HIPAA architecture issues 90% Encryption in transit (SSL)
  • 27. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Why network issues?
  • 28. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Agenda • A typical HIPAA website stack • Network challenges in legacy systems • Our static ALB solution Common network issues and how to resolve them
  • 29. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Typical HIPAA website stack
  • 30. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Typical HIPAA website stack
  • 31. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Typical HIPAA website stack
  • 32. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Typical HIPAA website stack
  • 33. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Typical HIPAA website stack
  • 34. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Typical HIPAA website stack
  • 35. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Expectations Reality
  • 36. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Legacy networking issues
  • 37. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Anti-patterns Network Load Balancers
  • 38. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Anti-patterns That’s the domain name for the IP 1.2.3.4.5.6. The TTL value says “300 seconds” Client DNS Server
  • 39. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Anti-patterns No Load Balancing
  • 40. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. A better solution
  • 41. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Better solution for multi-cert situations
  • 42. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 43. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Prerequisites Internal Application Load Balancer IP IP IP
  • 44. How do we keep up-to-date?
  • 45. How do we keep up-to-date?
  • 46. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. A perfect task for Lambda
  • 47. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Get the solution now! http://logicworks-oss.s3-website-us-east-1.amazonaws.com/static-alb.yaml
  • 48. Thank you! © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 49. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.